Hardware security module

Results: 168



#Item
31Machine-to-Machine / Computer network security / M2M / Security service / SMS / Hardware security module / Telit / SIMCom / Technology / Mobile technology / Communication

DOC Document

Add to Reading List

Source URL: onem2m.org

Language: English - Date: 2014-09-26 06:22:04
32HOTP / Cryptographic protocols / Hardware security module / PKCS / SecurID / Key Management Interoperability Protocol / One-time password / X Window System / PKCS11 / Cryptography / Internet protocols / Cryptography standards

Key Management SDKs Complete vendor-independent key management solution 01010101100100101101001101110010101011010101010 KEY MANAGEMENT

Add to Reading List

Source URL: www.cryptsoft.com

Language: English - Date: 2015-04-27 12:14:08
33V-OS Secure Mobile Middleware KEY BENEFITS What Delivering a solid security foundation for enterprise mobile applications.

V-OS Secure Mobile Middleware KEY BENEFITS What Delivering a solid security foundation for enterprise mobile applications.

Add to Reading List

Source URL: www.v-key.com

Language: English - Date: 2013-07-28 12:12:01
34An introduction to the use of HSM

An introduction to the use of HSM

Add to Reading List

Source URL: nlnetlabs.nl

Language: English - Date: 2009-06-27 06:06:51
35   Internet	
  Corporation	
  for	
  Assigned	
  Names	
  and	
  Numbers	
   Root DNSSEC KSK Ceremony 21 Thursday April 9, 2015

  Internet  Corporation  for  Assigned  Names  and  Numbers   Root DNSSEC KSK Ceremony 21 Thursday April 9, 2015

Add to Reading List

Source URL: data.iana.org

Language: English - Date: 2015-04-03 14:09:06
36A Linux kernel cryptographic framework: Decoupling cryptographic keys from applications Nikos Mavrogiannopoulos COSIC/ESAT – IBBT Katholieke Universiteit Leuven

A Linux kernel cryptographic framework: Decoupling cryptographic keys from applications Nikos Mavrogiannopoulos COSIC/ESAT – IBBT Katholieke Universiteit Leuven

Add to Reading List

Source URL: www.cosic.esat.kuleuven.be

Language: English
37An introduction to the use of HSM

An introduction to the use of HSM

Add to Reading List

Source URL: www.nlnetlabs.nl

Language: English - Date: 2009-06-27 06:06:51
38Simplify the complexity of EMV data preparation Prime Factors makes legacy-system EMV data preparation as easy and familiar as magnetic stripe is today. Now you can control your most sensitive and proprietary information

Simplify the complexity of EMV data preparation Prime Factors makes legacy-system EMV data preparation as easy and familiar as magnetic stripe is today. Now you can control your most sensitive and proprietary information

Add to Reading List

Source URL: primefactors.com

Language: English - Date: 2013-05-09 18:04:22
39The Internet Corporation for Assigned Names and Numbers SERVICE ORGANIZATION CONTROL 3 (SOC3) Report on Internet Corporation for Assigned Names and Numbers (“ICANN”)’s Assertion of the Suitability of Design and Ope

The Internet Corporation for Assigned Names and Numbers SERVICE ORGANIZATION CONTROL 3 (SOC3) Report on Internet Corporation for Assigned Names and Numbers (“ICANN”)’s Assertion of the Suitability of Design and Ope

Add to Reading List

Source URL: cert.webtrust.org

Language: English - Date: 2015-03-27 12:44:37
40prime_factors_diagram_NEW

prime_factors_diagram_NEW

Add to Reading List

Source URL: www.primefactors.com

Language: English - Date: 2013-04-10 17:16:39